All Apps and Add-ons

evtsys to syslog for windows events

coreyf311
Path Finder

collecting windows logs using evtsys and forwarding to a syslog server. I have a UF installed on the universal forwarder reading the windows logs created by evtsys. I have tried using sourcetype=WinEventLog:Security but the logs do not match what I see in the samples directory from the Splunk_TA_windows apps so these events are not extracted per the app. Is there a TA or sourcetype i can use to get evtsys logs parsed correclty? trying to avoid a custom props/transforms from scratch to parse all this data.

Tags (1)
0 Karma

efika
Communicator

Did you manage to find a solution other than writing your own props/transforms ?

0 Karma

FrankVl
Ultra Champion

Can you perhaps share a few sample logs, for those of us not familiar with evtsys? Perhaps someone recognizes it as a format that is supported by some Splunk add-on or one of the sourcetypes supported by Splunk TA Windows (perhaps it looks like snare logs?).

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...